Exam 3 Flashcards

1
Q

Address Spoofing

A

changes an originating address or a destination address to redirect the flow of data between two parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AES

A

(Advanced Encryption Standard) is the encryption standard currently used worldwide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Antivirus Program

A

type of utility software that looks for and eliminates viruses, trojans, worms, and other malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Botnet

A

a client-server network created by hackers who gain control over several computers; this network is hidden from the victims, who continue to use their devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Case Tool

A

(computer-aided software engineering tool) is a software application designed for documenting system requirements, diagramming current and proposed information systems, scheduling development tasks, and developing computer programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Common Carrier*

A

entity who provides wired/wireless communication services to general public for a fee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Computer Generations*

A

1G – Vacuum Tubes
2G - transistors and OS
3G – integrated circuits
4G – general purpose micro processors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Computer Virus*

A

is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate executable file on a host device. NOT SELF DISTRIBUTING*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Computer Worm*

A

3 types
Mass mailing – sends itself out in emails
Internet – Embeds itself in web pages
File sharing – embeds itself in files and internet networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CRT*

A

Cathode Ray Tube, technology that was handily there from television tech for computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cyberwarfare

A

is the use of ICT technology to carry out politically motivated attacks designed to infiltrate, sabotage, or damage an opponent’s information systems and defensive capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data Breach

A

is an incident in which personal data is viewed, accessed, or retrieved without authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data Center

A

is a specialized facility designed to hold and protect computer systems and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Disaster Recovery Plan

A

is a step-by-step description of the methods used to secure data against disaster and a set of guidelines for how an organization will recover lost data and resume operations if and when a disaster occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Disruptive Technology*

A
displaces an existing business process, market, industry, or product
----
Examples: Cellphones, computers
---
Usually positive, can be negative.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Electronic Communications Privacy Act*

A

(ECPA) prohibits unauthorized interception or disclosure of wire and electronic communications or unauthorized access to stored communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Encryption (m)

A

transforms a message or data file in such a way that its contents are hidden from unauthorized readers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Expert Systems

A

Fuzzy logic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Feature Creep

A

one of the steps of failure, when you add too many features and it causes you go to over budget or miss deadlines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Firewall

A
  • is a device or software that is designed to block unauthorized access while allowing authorized communications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Heuristic Analysis

A

how antivirus’s find virus’s without knowing what they look like by watching the program and what it does

22
Q

ICT Core Industries

A

made up of businesses that focus on digital equipment, software, and communications technologies

23
Q

Identity Theft

A

is the fraudulent use of someone’s personal information to carry out transactions, such as applying for loans, making purchases, collecting tax refunds, or obtaining false identity documents

24
Q

Internet Worm

A

looks for vulnerabilities in operating systems, open communication ports, and JavaScripts on Web pages

25
JAD*
(Joint application design) puts a user, programmer, and analyst together to design the software and reduce failure rate
26
Last Mile*
the last mile of cable is the last sections that are not upgraded to fiber optic, namely to people’s homes and to some businesses.
27
LOM*
(lights out management) is a data center type where nobody works there, it is just the servers. Highly secure.
28
Malware
refers to any computer program designed to surreptitiously enter a digital device
29
MIS
(management information system)
30
Moore’s Law*
every 18-24 months computer | speeds double
31
OLTP*
(online transaction processing) a real-time method in which each transaction is processed as it is entered
32
Outsourcing
is the use of components or labor from outside suppliers
33
Patriot Act*
Federal law passed so that the FBI and CIA should share important info electronically. Also made legal punishment for hackers worse.
34
Pharming*
redirects Web site traffic to fraudulent Web sites that distribute malware, collect personal data, and perpetrate other scams
35
PIECES*
``` PIECES framework helps classify problems in an information system; each letter of PIECES stands for a potential problem P - Performance I - Information E - Economics C - Control E - Efficiency S - Service ```
36
Project Failure Reasons*
1. Feature/Scope creep – adding too many features – causes the other two 2. Over budget – too much money 3. Over time – fails to hit the deadlines
37
Ransomware
locks a device and then requests payment for an unlocking code; commonly exploits the Find My iPhone feature
38
Resume*
document you submit to companies that gives a basic overview of you.
39
Rootkit Virus*
virus that attaches to your C drive, or your root drive. Most dangerous type of virus.
40
SDLC*
System development life cycle | Planning > Analysis > Design > Implementation > Maintenance
41
Social Engineering
(SE) is a deceptive practice that exploits human psychology by inducing victims to interact with a digital device in a way that is not in their best interest
42
Spyware (m)
any software that secretly gathers personal information without the victim’s knowledge
43
STEM
STEM (science, engineering, technology, and math)
44
Strong Passwords
difficult to hack; conventional wisdom tells us that strong passwords are at least eight characters in length and include one or more uppercase letters, numbers, and symbols
45
System risk*
over budget
46
Testing
over time
47
Throughput*
rate of production or the rate at which something is processed
48
TPS
(transaction processing system) provides a way to collect, process, store, display, modify, or cancel transactions
49
Trojan
(trojan horse) is a computer program that seems to perform one function while actually doing something else; most trojans are not designed to replicate themselves
50
Whistleblowing
is the disclosure by an employee (or professional) of confidential information that relates to some danger, fraud, or other illegal or unethical conduct connected with the workplace